Let’s Encrypt SSL on Debian 8 with Apache web server

Estimated reading time: 2 min

Introduction

In this tutorial, you will learn the procedure of TLS/SSL certificate installation on Apache web server running on Debian 8 Jessie. Once you are finished, all traffic between server and client will be encrypted and safe. This is a standard practice of securing e-commerce websites and other financial services online.

Prerequisites

Before you begin working with this guide you’ll need these:

  • SSH with non root but sudo user access to the Debian 8 Jessie VPS
  • The apache web server with properly a domain and vhost configured

Step 1: Installing Let’s Encrypt certbot

The first step to using Let’s Encrypt to obtain an SSL certificate is to install the certbot Let’s Encrypt client on your server. To access the certbot package, we will have to enable the Jessie backports repository as the certbot package was not available when Debian 8 was released. This repository can be used to install more recent versions of software than the ones included in the stable repositories. Add the backports repository to your server by typing:

echo 'deb http://ftp.debian.org/debian jessie-backports main' | sudo tee
/etc/apt/sources.list.d/backports.list

Now you should be ready to proceed further.

sudo apt-get update && sudo apt-get install python-certbot-apache -t jessie- backports

Step 2: Create and install the SSL certificate(s)

Generating the SSL Certificate for Apache using the Let’s Encrypt client is quite straightforward. The client will automatically obtain and install a new SSL certificate that is valid for the domains in our Apache configuration. To execute the interactive installation and obtain a certificate for all of the domains de ned in your Apache configuration, type:

sudo certbot --apache

Step 3: Check the SSL certificate(s) configuration

At above stage your certi cate are created and configured. Now check your domain virtualhost config with the ssl is like this or not. If not then put these manually on virtualhost’s ssl configuration:

...
SSLCertificateFile /etc/letsencrypt/live/<your-domain>/cert.pem
SSLCertificateKeyFile /etc/letsencrypt/live/<your-domain>/privkey.pem
SSLCertificateChainFile /etc/letsencrypt/live/<your-domain>/chain.pem
...

Now need to test as our configuration goes right with this –

sudo apachectl configtest

Finally, restart Apache and You can taste that your SSL is working. 🙂

sudo service apache2 reload

Step 4: Setting up for the auto renewal

The Certbot packages on your system come with a cron job that will renew your certificates automatically before they expire. Since Let’s Encrypt certificates last for 90 days, it’s highly advisable to take advantage of this feature. You can test automatic renewal for your certificates by running this command:

sudo certbot renew --dry-run

Conclusion

You have just secured your apache web server by implementing the most anticipated security feature – free SSL certificates! From now on all traffic between your domain web server and client is secure, you can be assured that no one could intercept the communication and alter or steal crucial information.

Was this article helpful?
Dislike 11
Views: 19271

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *